
wp2pgpmail Security & Risk Analysis
wordpress.org/plugins/wp2pgpmailA simple PGP Mail Form Plugin. Enter your PGP public key, then visitors will be able to send you PGP encrypted messages by mail from a form.
Is wp2pgpmail Safe to Use in 2026?
Generally Safe
Score 100/100wp2pgpmail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp2pgpmail v1.28 plugin presents a mixed security posture. On the positive side, it has no recorded CVEs, indicating a potentially stable security history. The plugin also exclusively uses prepared statements for its SQL queries, which is a significant strength in preventing SQL injection vulnerabilities. Furthermore, it has a limited attack surface with only one shortcode and no unprotected AJAX handlers, REST API routes, or cron events.
However, several concerning signals emerge from the static analysis. The presence of the `proc_open` function is a significant risk, as it can be exploited for command injection if user-supplied input is not rigorously sanitized. The taint analysis reveals two high-severity flows with unsanitized paths, suggesting potential vulnerabilities related to how data is handled, particularly when it originates from external sources and is used in sensitive operations. The low percentage of properly escaped output (17%) is also a major concern, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities.
While the plugin's vulnerability history is clean, the static analysis findings, particularly the use of `proc_open` and the high-severity unsanitized paths, point to inherent risks that need immediate attention. The lack of nonce and capability checks on its entry points, coupled with the poor output escaping, means that even though no past vulnerabilities are known, the plugin is susceptible to common web attack vectors. Therefore, while its historical record is good, the code itself contains significant weaknesses that warrant a high level of caution.
Key Concerns
- High severity unsanitized paths in taint analysis
- High severity unsanitized paths in taint analysis
- Dangerous function proc_open used
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- Low percentage of properly escaped output
- No nonce checks found
- No capability checks found
wp2pgpmail Security Vulnerabilities
wp2pgpmail Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
wp2pgpmail Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
wp2pgpmail Maintenance & Trust
Maintenance Signals
Community Trust
wp2pgpmail Alternatives
WP PGP Encrypted Emails
wp-pgp-encrypted-emails
Signs and encrypts emails using PGP/GPG keys or X.509 certificates. Provides OpenPGP and S/MIME functions via WordPress plugin API.
PGP Key Generator
pgp-key-generator
A plugin to generate private and public PGP keys. No need to install any software to encrypt and decrypt PGP messages.
CryptX
cryptx
No more SPAM by spiders scanning your site for email addresses!
Secure Encrypted Form
secure-encrypted-form
This plugin adds a secure form in your website that uses OpenPGP encryption to secure sensitive communications.
OpenPGP Form Encryption for WordPress
openpgp-form-encryption
OpenPGP public key encryption for any textarea with a shortcode button.
wp2pgpmail Developer Profile
3 plugins · 220 total installs
How We Detect wp2pgpmail
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp2pgpmail/js/rsa.js/wp-content/plugins/wp2pgpmail/js/aes-enc.js/wp-content/plugins/wp2pgpmail/js/sha1.js/wp-content/plugins/wp2pgpmail/js/base64.js/wp-content/plugins/wp2pgpmail/js/mouse.js/wp-content/plugins/wp2pgpmail/js/PGencode.js/wp-content/plugins/wp2pgpmail/js/openpgp.min.js/wp-content/plugins/wp2pgpmail/js/PGpubkey.js+1 morejs/rsa.jsjs/aes-enc.jsjs/sha1.jsjs/base64.jsjs/mouse.jsjs/PGencode.js+2 morewp2pgpmail/js/rsa.js?ver=wp2pgpmail/js/aes-enc.js?ver=wp2pgpmail/js/sha1.js?ver=wp2pgpmail/js/base64.js?ver=wp2pgpmail/js/mouse.js?ver=wp2pgpmail/js/PGencode.js?ver=wp2pgpmail/js/openpgp.min.js?ver=wp2pgpmail/js/PGpubkey.js?ver=wp2pgpmail/css/wp2pgpmail-admin.css?ver=HTML / DOM Fingerprints
wrapname="s"action="javascript:getkey()"name="pubkey"name="vers"name="user"name="keyid"+3 morekeytypkeyidpubkeygetkeySecurimage[wp2pgpmail]